1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
Alexeev081 [22]
3 years ago
9

Why is it essential for every person living in the 21st century to have a computer​

Computers and Technology
1 answer:
Zolol [24]3 years ago
4 0

Answer: because computers are our main source of communicating and where we find a wide range of information to help us

Explanation:

You might be interested in
If you were looking for a record in a very large database and you knew the ID number, which of the following would be the most d
dezoksy [38]

Answer:

By the record ID

Explanation:

5 0
4 years ago
Which statement best describes a scientific theory?
lisov135 [29]

Answer:

It is supported by many different experiments.

Explanation:

Scientific theory is based on different experiments and tested in different situations and environment will all aspects. If the experiment finds true then observations will become theory. It can be changed in future if it does not meet the newly proposed conditions. But It does not means that, every theory can be changed.

6 0
3 years ago
HELP !!! Prompt <br> What is formatting text?
Svetach [21]

Answer:

Formatting text is how something is specifically layed out. Specific style.

Explanation:

7 0
3 years ago
Read 2 more answers
To ease giving access to network resources for employees, you decide there must be an easier way than granting users individual
scoundrel [369]

Answer

The intranet security model

Explanation:

This is an enterprise system that processes user information for security  and access authentication. It prevents unauthorized users, who are not part of the network resources from capturing these information.

The intranet security model is an efficient security procedure that incorporates web security  access control in keeping information safe over the intranet. It is also useful in encryption and decryption techniques.

4 0
3 years ago
Hello 10 points if my Chromebook is on 26 percent how much time do I have left theoretically
velikii [3]
About 15 minutes.......
7 0
3 years ago
Read 2 more answers
Other questions:
  • If you implement a Wireless LAN (WLAN) to support connectivity for laptops in the Workstation Domain, which domain does WLAN fal
    5·1 answer
  • For a wire with a circular cross section and a diameter = 3.00mm calculate the following: (m means meter. mm means millimeter. c
    5·1 answer
  • Why is an ISA unlikely to change between successive generations of microarchitectures
    11·1 answer
  • Which image file format is the best format to use for photographs on the Web
    15·1 answer
  • Which of the following candidates would most likely be hired as a graphic artist?
    15·2 answers
  • Software licensed as proprietary
    11·2 answers
  • About C header files of C programming
    8·1 answer
  • In what type of attack does the attacker have the ciphertext of several messages that were encrypted with the same encryption al
    14·1 answer
  • Do you have any sprites for Friday Night Funkin?
    14·1 answer
  • Kaitlin likes a particular design theme, but she is not sure about every single color for bullets, backgrounds, etc. found in th
    7·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!